Your security is of utmost importance to us. This document outlines our commitment to ensuring that our software remains secure, how we handle vulnerabilities, and what you can do if you find one.
Security updates will be applied to certain versions of our software. Please refer to the table below to understand which versions are currently supported for security patches.
Version | Supported | Notes |
---|---|---|
1.6.x | ✅ | Current version, fully supported. |
1.5.x | ❌ | Not supported, please upgrade to 1.6.x |
1.4.x | ❌ | Not supported, please upgrade to 1.6.x |
1.3.x | ❌ | Not supported, please upgrade to 1.6.x |
1.2.x | ❌ | Not supported, please upgrade to 1.6.x |
1.1.x | ❌ | Not supported, please upgrade to 1.6.x |
1.0.x | ❌ | Not supported, please upgrade to 1.6.x |
We appreciate the effort of security researchers and the general public in helping us maintain the security of our software. Here’s how you can report a vulnerability:
- Creating an Issue: Visit our GitHub repository and create an issue detailing the vulnerability. Please label the issue as "security" for quicker identification.
- Details Matter: When reporting, please provide as much detail as possible. This includes steps to reproduce, potential impact, and any other information that might help us understand the severity and nature of the vulnerability.
- Stay Responsible: Avoid disclosing public details about the vulnerability until we've had a chance to address it. This ensures that our users remain protected.
Upon receiving a security vulnerability report:
- We will confirm the receipt of the report and begin an initial assessment.
- We will work to verify the vulnerability and ascertain its potential impact.
- If required, we will release patches for the affected versions.
- We will recognize your efforts in our changelog and other public communications, unless you prefer to remain anonymous.
We recommend all users to:
- Stay updated with the latest version of our software.
- Monitor our GitHub repository for updates, especially those related to security.
- Set up strong authentication practices when using our software.
Your security is a collaborative effort, and we are grateful for your trust and participation in keeping our library safe and reliable.